Applying the Proper Security Model to Support Your Solutions

  • Philip Weinmeister
Chapter

Abstract

Although one chapter is not nearly enough to cover all of its facets, I would be remiss to completely omit security considerations in this book. The world of Salesforce.com security is vast and involves a number of features and intricacies. However, I believe that I can break down the key security elements, as they relate to Salesforce.com development without code, in a meaningful, understandable way to help you as you build declarative solutions on the platform.

Keywords

User Profile Security Requirement Security Model Sharing Rule Specific Record 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Philip Weinmeister 2015

Authors and Affiliations

  • Philip Weinmeister
    • 1
  1. 1.GAUnited States

Personalised recommendations